Technology > Security
<1234567...16>
Simple Conversions

ASCII to Binary, Binary to ASCII, ASCII to Hex, Hex to ASCII, Binary to Hex, Hex to Binary, Dec to Hex, Hex to Dec, Dec to Roman, Roman to Dec
Network Tools

IP to Dec, Dec to IP, IP to Hex, Hex to IP, IP/Net Calculator, IPv6 Validator, IPv6 Compress, IPv6 Uncompress
Non-Key En/DeCoding Methods

PasswordGen, Backwards, Base 32 (RFC3548, Safe, 09AV), Base 64, Caesar Bruteforce, l33t 5p34k 3nc0d3, l33t 5p34k d3c0d3, Igpay Atinlay, Un-Pig Latin, ROT-13, Morse encode, Morse decode, Papertape
HTML Encoding

HTML Entities Encode/Decode, URL Encode/Decode
Hash Algorithms

DES, MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, HAVAL 128, HAVAL 160, HAVAL 192, HAVAL 224, HAVAL 256, RIPEMD 128, RIPEMD 160, RIPEMD 256, RIPEMD 320, Tiger, Tiger 128, Tiger 160, Adler 32, Whirlpool, GOST, CRC32, CRC32B
Key En/DeCryption

Triple DES, Blowfish, CAST 128, CAST 256, GOST, Rijndael 128, Rijndael 192, Rijndael 256, SERPENT, Safer+, RC2, XTEA, LOKI97, DES, TwoFish
(ECB + CBC mode, BASE64 armored)
Time Conversion

Unix Timestamp to Date/Time, Date/Time to Unix Timestamp, Unix Timestamp to RFC 2822, Unix Timestamp to Internet Time, Unix Timestamp to ISO 8601
Validation

IBAN
You need to login to report a site Details
Last check 2024-09-22 01:55 UTC Online (1 sec)
FakeID Generator with Tor Anonymity check and other services.
You need to login to report a site Details
Last check 2024-09-11 18:10 UTC Online (2 sec)
No user evaluation yet
Whonix is a desktop operating system designed for advanced security and privacy. Whonix mitigates the threat of common attack vectors while maintaining usability. Online anonymity is realized via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Commonly used applications are pre-installed and safely pre-configured for immediate use. The user is not jeopardized by installing additional applications or personalizing the desktop. Whonix is under active development and is the only operating system designed to be run inside a VM and paired with Tor.
You need to login to report a site Details
Last check 2024-10-27 12:30 UTC Online (3 sec)
OnionShare is an open source tool that lets you securely and anonymously share a file of any size.

"Onionshare lets users share files securely and anonymously, without middlemen."
You need to login to report a site Details
Last check 2024-10-27 13:10 UTC Online (3 sec)
No user evaluation yet
Privacy Freedom from damaging publicity, public scrutiny, secret surveillance, or unauthorized disclosure of one�s personal data or information, as by a government, corporation, or individual
You need to login to report a site Details
Last check 2024-09-03 11:22 UTC Online (3 sec)
No user evaluation yet
AnarSec is a resource designed to help anarchists navigate the hostile terrain of technology — defensive guides for digital security and anonymity, as well as offensive guides for hacking.
You need to login to report a site Details
Last check 2024-09-07 23:25 UTC Online (4 sec)
No user evaluation yet
Upload your PGP key for free, obviously it works without JS
You need to login to report a site Details
Last check 2024-09-10 20:00 UTC Online (4 sec)
No user evaluation yet
The file you see is just the tip of the iceberg. Remove the hidden metadata.
You need to login to report a site Details
Last check 2024-09-10 20:35 UTC Online (4 sec)
Cloudflare Public DNS 1.1.1.1

You’re one tap away from a safer Internet.

When the Internet was built, computers weren’t mobile. Those days are long gone—the assumptions made 30 years ago are now making your Internet experience slow and insecure.

1.1.1.1 with WARP replaces the connection between your phone and the Internet with a modern, optimized, protocol.
You need to login to report a site Details
Last check 2024-09-28 06:05 UTC Online (5 sec)
No user evaluation yet
BridgeDb can provide bridges with several types of Pluggable Transports, which can help obfuscate your connections to the Tor Network, making it more difficult for anyone watching your internet traffic to determine that you are using Tor.

What are bridges?

Bridges are Tor relays that help you circumvent censorship.
You need to login to report a site Details
Last check 2024-09-10 19:55 UTC Online (5 sec)
<1234567...16>